Coinbase cyberattack focused staff with pretend SMS alert

Coinbase cyberattack focused staff with pretend SMS alert

Coinbase cyberattack focused staff with pretend SMS alert

Coinbase cryptocurrency change platform has disclosed that an unknown menace actor stole the login credentials of one among its staff in an try to realize distant entry to the corporate’s methods.

On account of the intrusion the attacker obtained some contact info belonging to a number of Coinbase staff, the corporate stated, including that buyer funds and knowledge remained unaffected.

Coinbase’s cyber controls prevented the attacker from gaining direct system entry and prevented any lack of funds or compromise of buyer info. Solely a restricted quantity of information from our company listing was uncovered – Coinbase

Coinbase has shared the findings of their investigation to assist different firms determine the menace actor’s techniques, strategies, and process (TTPs) and arrange acceptable defenses.

Assault particulars

The attacker focused a number of Coinbase engineers on Sunday, February 5 with SMS alerts urging them to log into their firm accounts to learn an vital message.

Whereas most staff ignored the messages, one among them fell for the trick and adopted the hyperlink to a phishing web page. After getting into their credentials, they had been thanked and prompted to ignore the message.

Within the subsequent part, the attacker tried to log into Coinbase’s inside methods utilizing the stolen credential however failed as a result of entry was protected with multi-factor authentication (MFA).

Roughly 20 minutes later, the attacker moved to a different technique. They known as the worker claiming to be from the Coinbase IT group and directed the sufferer to log into their workstation and comply with some directions.

“Luckily no funds had been taken and no buyer info was accessed or seen, however some restricted contact info for our staff was taken, particularly worker names, e-mail addresses, and a few cellphone numbers” – Coinbase

Coinbase’s CSIRT detected the weird exercise inside 10 minutes because the begin of the assault and contacted the sufferer to inquire about uncommon latest actions from their account. The worker then realized one thing was incorrect and terminated communications with the attacker.

Defending

Coinbase has shared a number of the noticed TTPs that different firms may use to determine the same assault and defend towards it: 

  • Any net visitors from the corporate’s expertise belongings to particular addresses, together with sso-.com, -sso.com, login.-sso.com, dashboard-.com, and *-dashboard.com.
  • Any downloads or tried downloads of particular distant desktop viewers, together with AnyDesk (anydesk dot com) and ISL On-line (islonline[.]com)
  • Any makes an attempt to entry the group from a third-party VPN supplier, particularly Mullvad VPN
  • Incoming cellphone calls/textual content messages from particular suppliers, together with Google Voice, Skype, Vonage/Nexmo, and Bandwidth
  • Any surprising makes an attempt to put in particular browser extensions, together with EditThisCookie

Will Thomas of the Equinix Risk Evaluation Heart (ETAC) found some further Coinbase-themed domains that match the corporate description, which had been probably used within the assault:

  • sso-cbhq[.]com
  • sso-cb[.]com
  • coinbase[.]sso-cloud[.]com

It’s value noting that the attacker’s modus operandi is just like what was noticed in the course of the Scatter Swine/0ktapus phishing campaigns final yr and Coinbase believes that the identical menace actor is liable for the assault.

Based on cybersecurity firm Group-IB, the menace actor stole virtually 1,000 company entry logins by sending phishing hyperlinks over SMS to firm staff.

0ktapus phishing attack
0ktapus phishing assault
supply: Group-IB

Staff of firms that handle digital belongings and have a powerful on-line presence are sure to be focused by social engineering actors sooner or later.

Adopting a multi-layered protection could make an assault sufficiently difficult for many menace actors to surrender. Implementing MFA safety and using bodily safety tokens may also help defend each shopper and company accounts.